Businesses have been using email, a cloud-based service, for decades. The recent push for compliance and security have given rise to various technology and services to provide encryption for sending / receiving messages especially through email. For most users Office 365 Encryption is the easiest and best way of sending encrypted email. This is done by purchasing licenses / configuring Azure Rights Management either through Enterprise Mobility Suite or Microsoft Azure Rights Management Premium in their Office 365 account. Once licensed the following setup procedure is needed to setup basic email encryption for all users:
Basic Office 365 Encryption Setup
Login to Office 365 portal as Global Administrator and click on the Admin tile.
In the left hand menu select Service Settings > Rights Management then click on the Manage link to the right.
On the Rights Management page click on the Activate button.
Now type in the following to configure the Rights Management Services (RMS) online key-sharing location in Exchange Online (This is North American companies only.):
To verify that you successfully configured IRM in Exchange Online to use the Azure Rights Management service, run the following:
Test-IRMConfiguration -RMSOnline
Run the following commands to disable IRM templates from being available in OWA and Outlook and then enable IRM for your cloud-based email organization to use IRM for Office 365 Message Encryption:
 
This completes the PowerShell portion. Make sure that all users who will be using Encryption have been given a license for the purchased service in the Office 365 portal.
In the Office 365 portal in the left hand menu click on Admin > Exchange.
In the Exchange Admin Center in the right hand side under Mail Flow click on Rules.
Click on the + symbol and choose “Create a New Rule…” option.
Give the Rule a name like “Message Encryption” then click on “More Options…”
Under “Apply this rule if…” select “The subject or body includes…” and add “Encrypt:” as the search term.
Under “Do the following…” select “Modify the message security…” then select “Apply Office 365 Message Encryption”
Leave the other options as default unless otherwise needed and click on Save button.
This then allows users of Outlook or OWA to add the work “Encrypt:” to the subject line of an email and have the message sent as encrypted. The recipient will receive and HTML document that details how to access the contents of the email securely via Microsoft login or one time access code sent to their email. If they are accessing email from their phones then there is an App for that too. If your organization needs any help with compliance of email encryption then don’t hesitate to contact us for support.
Administrators who have been using the tried and true DirSync utility from Microsoft will be pleasantly surprised by the upgrade / replacement by the Windows Azure AD Connect utility for password sync with Active Directory or Hybrid configurations. Here are the basics on an upgrade for a site with only password sync enabled:
Office 365 Azure AD Connect Upgrade
The way to see if your organization is ready for the upgrade is to check under Admin > Users > Active Users > Active Directory Synchronization > Manage in the Office 365 portal.
Click on the Upgrade link which will redirect to the download site for the Microsoft Azure Active Directory Connect utility.
Download and run the utility as administrator which will bring up the following welcome screen which requires agreement to continue the conversion process.
The tool will then examine the current DirSync setup for your organization.
Once done it will present you with the option to continue with the upgrade.
Enter your organization’s Office 365 global administrator credentials.
Enter local domain administrator credentials
Then there is the option to enable hybrid configuration or start a manual first sync. Choose the first sync and continue.
After much labor on the part of the tool it will finish successfully.
Finally a couple notes to make life easier. First is to add a shortcut to the Synchronization Service Manager on the desktop pointing to the following:
%systemdrive%\Program Files\Microsoft Azure AD Sync\UIShell\miisclient.exe
Second is to create a powershell script to start a manual sync as follows:
This will then begin to use the Azure AD Connect utility to run the password sync to Office 365 from local Active Directory domain. If you company needs any help with Office 365, Exchange or Active Directory then don’t hesitate to contact us for assistance.
Modern businesses are transitioning from break-fix computer repair to proactive IT management for stability, security, and growth.
You’re not imagining it: the computer repair industry is changing fast—but it’s not dying. It’s splitting. Traditional “fix my broken PC” walk-in work is declining, while managed IT services, cybersecurity, cloud support, and strategic consulting are growing.
Below is a concise, SEO-optimized guide to help you decide how to adapt.
Is the Computer Repair Industry Growing or Declining?
For break-fix computer repair (one-off repairs, virus removal, hardware swaps), demand is largely declining:
Hardware is cheaper and more disposable, especially laptops and consumer desktops.
Cloud and SaaS reduce local software issues.
Remote work and remote management tools mean many problems never reach a local shop.
However, the broader “computer support and IT services” industry is growing:
Global managed services market is projected to grow in the high single to low double digits annually over the next few years, driven by cybersecurity, cloud, and remote monitoring.
Cybersecurity demand continues to rise as attacks target small and mid-sized businesses, healthcare, and financial firms.
Compliance and data protection requirements are pushing organizations to formalize IT management rather than rely on ad-hoc repair.
In practice: the industry isn’t disappearing—it’s shifting from repair to proactive, managed, and strategic IT.
What This Means for Your Business
If your organization still thinks of IT as “call someone when the computer breaks,” you are operating in the declining part of the market.
To stay competitive, you and your IT team must:
Move from break-fix to proactive maintenance and monitoring.
Treat IT as a business function, not a cost center or emergency service.
Build resilience: backups, security, and business continuity.
This shift directly affects how you work with outside providers and how your internal IT department is structured.
Practical Action Steps for Owners and IT Departments
Here’s a focused roadmap to move from “computer repair” thinking to “managed IT” thinking.
Audit your current IT and risk exposure
List all critical systems: servers, workstations, line-of-business apps, cloud services.
Identify single points of failure (one server, one person, one outdated backup).
Review your last 12–24 months of issues: downtime, security problems, lost data, slow performance.
Quantify the business impact
Estimate the cost per hour of downtime: lost revenue, staff idle time, reputational damage.
Compare that cost against what you currently spend on one-off repairs or underpowered internal IT.
Use this data to justify a more robust, proactive IT model.
Implement proactive monitoring and maintenance
Deploy remote monitoring and management (RMM) tools across all endpoints.
Standardize patching schedules, antivirus/EDR, and firmware updates.
Establish regular health reports to leadership so you see trends before they become crises.
Upgrade your security posture
Enforce multi-factor authentication (MFA) on all critical systems and email.
Implement managed endpoint protection, email filtering, and DNS filtering.
Create and test an incident response plan so you know exactly what to do when—not if—an attack occurs.
Strengthen backup and disaster recovery
Move from “we think we have backups” to verified, automated, versioned backups.
Follow the 3-2-1 rule: 3 copies of data, on 2 different media, 1 offsite.
Test restore procedures quarterly and document recovery time objectives (RTOs).
Redefine your relationship with IT providers
Replace hourly, ticket-based “repair” work with a managed services agreement with clear SLAs.
Hold regular IT business reviews: security posture, risks, and upcoming technology needs.
Communicate the shift to your staff
Explain that IT is now about prevention, security, and productivity—not just repairs.
Train employees on security basics: phishing, password hygiene, remote work best practices.
Encourage staff to report issues early rather than wait until something is “completely broken.”
Common Client Questions (With Straight Answers)
Q1: “If hardware is cheaper, why not just replace instead of repair?” A: For many low-cost devices, replacement is more economical than component-level repair. The real value is in protecting data, uptime, and security, which is where managed IT, backup, and cybersecurity services matter far more than a one-time fix.
Q2: “Do we still need an internal IT person?” A: Often, a hybrid model works best. Your internal IT can focus on business processes, line-of-business apps, and staff support, while a managed services provider handles monitoring, security, infrastructure, and strategic planning. This reduces single-person risk and expands your capabilities.
Q3: “Can’t our cloud provider handle all of this?” A: Cloud providers secure their infrastructure, but you are still responsible for user access, configuration, data governance, and endpoint security. Most breaches happen at the user or configuration level, not in the cloud provider’s core systems.
Q4: “Isn’t proactive IT more expensive than calling for repairs?” A: On paper, a monthly fee can look higher than a few repair invoices. But when you factor in downtime, lost productivity, security incidents, and emergency project work, proactive IT usually lowers your total cost of ownership—and gives you predictability in your budget.
Q5: “How do we know if our current IT provider is still in ‘repair mode’?” A: Warning signs include: no regular reporting, no documented roadmap, no written security policies, mostly reactive ticket work, and limited visibility into your environment. A modern provider will talk business outcomes, not just fixes.
How Farmhouse Networking Helps You Move Beyond Repairs
Farmhouse Networking is built around the growing side of the “computer repair” industry: proactive, secure, business-focused managed IT.
Here’s how we can support your transition:
Environment and risk assessment We perform a detailed review of your current infrastructure, security, backups, and workflows, then deliver a clear, business-friendly risk report and prioritized remediation plan.
Managed IT and proactive monitoring We deploy RMM tools, automate patching, monitor endpoints and servers 24/7, and address issues before they impact your staff. You get consistent performance and fewer surprises.
Cybersecurity and compliance support We implement layered security (endpoint protection, MFA, email filtering, DNS filtering, and more) and help align your practices with industry expectations—especially important for healthcare, financial, and other regulated sectors.
Backup, disaster recovery, and business continuity We design and manage robust backup strategies, test restores regularly, and document realistic recovery times so leadership knows exactly what to expect in an incident.
Strategic IT guidance and roadmapping We partner with you on lifecycle planning, cloud adoption, budgeting, and technology alignment with your growth goals so IT stops being a headache and becomes a competitive advantage.
In short: instead of just fixing what’s broken, we help you build an IT foundation that is resilient, secure, and aligned with your business strategy.
Take the Next Step
If you’re concerned about whether you’re stuck in the declining “repair-only” world—or ready to move into proactive, modern IT management—Farmhouse Networking can guide that transition.
Email support@farmhousenetworking.com for more information about how Farmhouse Networking can help improve your business, reduce downtime, and turn IT into a strategic asset instead of a recurring problem.
Keep running into this issue at client sites where an on-premise Microsoft Exchange Server (especially from Microsoft SBS Server) to Office 365 migration has taken place. Client workstations are unable to connect to Office 365 servers via Autodiscover for their migrated email accounts. During Outlook first run it would pre-populate their email correctly but then try to connect to the old email server instead. If the DNS settings for the workstation were changed to non-domain external DNS servers then the email would not pre-populate but the setup would complete successfully. Checked the Autodiscover URL using NSLOOKUP to the Microsoft servers from local domain DNS servers successfully, so felt a little stumpled. Research pointed to the Service Connection Point (SCP) object in Active Directory which can be either deleted from the server or excluded on a per workstation basis, so both will be shown here. Starting with the server first:
Deleting SCP from Server after Office 365 Migration
Login to a server with Active Directory Domain Services installed as administrator
Launch ADSIedit from the Start Menu
Right click on the root of the console and choose “Connect to…”
Under “Select a well know Naming Context” choose Configuration
Navigate down through the tree as follows (these are always listed from the bottom up on other tech sites for some reason):
Add a 32-bit DWORD called ExcludeScpLookup with the value of 1 to enable
Reboot the workstation to effect the Registry changes and try to connect to Office 365 servers again
If your organization needs any help with troubleshooting issues with Office 365 or with migrating from on-premise Microsoft Exchange Server, then don’t hesitate to contact us for support.
And God will generously provide all you need. Then you will always have everything you need and plenty left over to share with others. As the Scriptures say,
“They share freely and give generously to the poor. Their good deeds will be remembered forever.”
For God is the one who provides seed for the farmer and then bread to eat. In the same way, he will provide and increase your resources and then produce a great harvest of generosity in you. - 2 Corinthians 9:8-10
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.